Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Yearly Archives: 2020

    1. Home  - 
    2. 2020
    3. ( Page2 )
    5 Aug, 2020
    ATM Assessment
    Information Security Cybersecurity, Penetration Testing, Vulnerabilty Assessment

    I’m sure that most of the people know what Automated Teller Machine (ATM) is and what is used in our daily life. Just for a reminder for those are not familiar with ATM, so Automated teller machine (ATM) is an

    Continue ReadingATM Assessment

    1 Aug, 2020
    QRLJACKING and QRLJACKER
    Penetration Testing Cybersecurity, QRLcode, Tools

    In this post, i would like to share one attack method that will take advantage on QR Code which called Quick Response Code Login Jacking (QRLJacking). QRLJacking is a new method that most people might not even heard before. QRLJacking

    Continue ReadingQRLJACKING and QRLJACKER

    6 Jun, 2020
    Importance of Security in Domain Name
    Information Security Cybersecurity, Email Security

    Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the data is been protected while surfing on the internet. An attacker can disrupt the organization’s

    Continue ReadingImportance of Security in Domain Name

    6 Jun, 2020
    Vulnerabilities that been published within 4 years ago
    Vulnerabilities Bug, Malware, Vulnerabilities

    For the past three years, a lot of vulnerabilities have been published in the security advisory to alert the user about the vulnerabilities. From the advisory that been listed, the following list of the vulnerabilities has been generated headlines among

    Continue ReadingVulnerabilities that been published within 4 years ago

    5 Jun, 2020
    CyberSecurity Experience
    Information Security Career Path, Cybersecurity

    In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and Penetration Tester Resource. SOC Analyst I have experience working in one organization as a SOC

    Continue ReadingCyberSecurity Experience

    7 Mar, 2020
    Data Breach Assessment
    Information Security Data, Data Breach, Personal Data

    What is Data Breach? Nowadays, there is a lot of Data Breach has been spread throughout the world. Data Breach severity can be considered as defined but some people will need to remember those context that written in the internet

    Continue ReadingData Breach Assessment

    1 Mar, 2020
    AWS Penetration Testing Review
    Penetration Testing AWS, Cloud, Penetration Testing, Privileges Escalation

    What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered as one of the areas that pentester will invest in during Red Team Activities. The finding that might catch the eyes of the attacker would

    Continue ReadingAWS Penetration Testing Review

    1 Feb, 2020
    XML Injection Attack review
    Penetration Testing Masterclass, Penetration Testing, XML Injection

    In this post, I would like to share about XML Injection Attack that might be useful for some scenarios. For those who are not familiar with XML Injection attack, XML Injection is an method that been used by the attacker

    Continue ReadingXML Injection Attack review

    28 Jan, 2020
    Cryptography Review
    Information Security Cryptography, Public Key, Security

    Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key that can be used in daily usage such as Public

    Continue ReadingCryptography Review

    23 Jan, 2020
    Monkey Testing Review
    Application Application, Monkey Testing, Testing

    While I was surfing the internet, I found the terms “Monkey Testing” where it has nothing to do with Penetration Testing. Monkey Testing can be categorized as a software testing technique. Why Monkey Testing? As we all know, Monkey is

    Continue ReadingMonkey Testing Review

    Posts pagination

    1 2 3
    Copyright © 2026 Threatninja.net | Powered by Neom